Enriching Cooking Workflows with Multimedia Data from a High Security Cloud Storage
|
|
- Emil Chambers
- 8 years ago
- Views:
Transcription
1 241 Enriching Cooking Workflows with Multimedia Data from a High Security Cloud Storage Patrick Bedué bedue@stud.uni-frankfurt.de Wenxia Han s @stud.uni-frankfurt.de Mathias Hauschild s @stud.uni-frankfurt.de Maximilian Pötz s @stud.uni-frankfurt.de Mirjam Minor minor@cs.uni-frankfurt.de Abstract: With increasing growth of cloud services and the ability to choose from different cloud providers, we propose a new way to connect cooking workflows with a high security cloud storage. We use Activiti for workflow design and JavaScript Object Notation (JSON) for structured data interchange with a sealed cloud storage. This approach supports cooking workflows with instructions from multimedia data (e.g. videos, pictures) for special interest groups of the cooking domain like private communities or even chronically ill patients. The paper makes a contribution to current trends in information-systems related research such as scalability and experience reuse. Further, it connects Cloud Computing with Business Process Management. 1 Introduction With growing globalization, information technology has become a key resource for business success or failure. IT is often used to manage business processes in companies and has become increasingly important, leading to a rise in new ways to organize business processes (Aalst, Benatallah et al. 2003). Cloud Computing changes the way we can develop and organize our resources and also enables a flexible and individual allocation of resources (Ciovică, Cristescu et al. 2014, Schulte, Janiesch et al. 2015). Business processes are modelled as a collection of activities, dependencies between activities and are technically supported by workflows (Aalst, Benatallah et al. 2003). Regarding actual research topics, realizing business processes in a flexible and costefficient way is on a rise (Schulte, Janiesch et al. 2015). There are some studies focusing on workflow execution in the cloud investigating infrastructural challenges of elastic Business Process Management or security issues (Wang, Korambath et al. 2014, Schulte, Janiesch et al. 2015). To develop our research proposition, we concentrate our work on the implementation of workflows in the cooking domain with a special focus on applying secure cloud technology for multimedia data integration and data objects representing ingredients. To improve the user experience, we investigate the feasibility of using multimedia data from a high security cloud storage and of integrating this data into workflows. The user advantage is that she no longer needs to store big multimedia files on her device and can execute workflows in a web interface. Secure cloud technology provides rapid Copyright 2015 for this paper by its authors. Copying permitted for private and academic purposes. In Proceedings of the ICCBR 2015 Workshops. Frankfurt, Germany.
2 242 scalability as well as data protection. Both are beneficial properties for using multimedia data in the cooking domain. With our proposed solution, the user is able to easily create cooking recipes on a platform and store multimedia data. Having started the workflow, the user is provided with cooking instructions including pictures or videos. Using secure cloud technology addresses private communities which e.g. do not want to publish content or appear in any videos accessible to the public, for instance chronically ill persons or allergy sufferers who do not want to share their special recipes or videos because their identity might be linked to serious diseases. For many people it is not an option to simply store the content on scalable platforms like YouTube because their children might be visible or because their employer might get knowledge about their special concerns. Our solution combines scalability with additional security and ensures that content is protected from persons who are not supposed to have access to the recipes. The technical solution is based on IDGARD which allows to separate data in different, sealed containers and to keep own videos or pictures confidential. With this new solution we address the open challenge of the Computer Cooking Contest. The remainder of our paper is structured as follows. At first we will provide an overview of our architecture and a sample of a workflow to ease comprehensibility. After that we will present our implementation concept and workflows from the cooking domain, which are based on cooking recipes of pasta. We conclude with a discussion of our research contribution and the new prospects for both companies and researchers. 2 Fundamentals Sealed Cloud A broad range of providers offer different models for services at different layers. But most of them do not guarantee security for the clients of a cloud provider or the privacy of the data (Santos, Gummadi et al. 2009). Especially in Germany, data protection and compliance issues require new technologies such as sealed cloud technology (Rieken 2015). A sealed cloud offers the technology to encrypt contents and meta data so that the cloud provider itself is not able to access data contents. The monitoring of user behavior and the possible access to protected content by providers is a big issue as part of data privacy and anonymity in the internet. We implement a new architecture to integrate multimedia data from the cloud using Activiti as a workflow engine and the sealed cloud IDGARD. Copyrighted Content From a user perspective, the access to files via the internet, for instance, by using mobile devices can be risky, because some information can be spied out by unauthorized persons. If some potential attackers retrieve user information while data is sent over the wire they may gain full access to the data storage. To prevent these attacks the usage of security tokens or passcodes (received via SMS) is necessary. IDGARD provides some of these additional security mechanisms.
3 243 From the provider perspective it is also difficult to secure data and protect it from unauthorized access or illegal sharing. Providers want to ensure that only one user or a specific user group is able to access data with the registered devices. By sending the unique keys to the registered devices, content providers can prevent the unauthorized sharing of data (e.g. by using a sealed cloud). There are similar examples in the nutrition domain where images or videos are already protected, for instance mycoachnutrition.com (MyCoachNutrition 2015). Like our approach, these services offer user individual content. In contrast to our work, they do not provide rapid scalability. Definition of Workflows Work is often organized as a sequence of individual tasks in which the progress can be observed (Hammer and Champy 1994). These individual tasks are linked to each other and they underlie a business objective or a policy goal (Workflow Management Coalition 1998). The automation of business processes is called workflow. According to the definition of the Workflow Management Coalition, a workflow is: The automation of a business process, in whole or part, during which documents, information or tasks are passed from one participant to another for action, according to a set of procedural rules. (Workflow Management Coalition 1998). In the remainder of this paper, we will use the term workflow as synonym for business process. For our project, we model different cooking instructions using Activiti as a workflow engine. A simple workflow consists of a start event, a task with a data object and an end event (see Figure 1). A task or an activity describes a piece of work that forms a logical step in a process. To support the process execution the workflow activity requires human and/or machine resources for process execution (Workflow Management Coalition 1998). We use different tasks and data objects to describe a cooking control flow. Rice Task (cook) Figure 1: Sample workflow (own representation)
4 244 3 Architecture General overview As illustrated in Figure 2, the introduced architecture consists of three layers: From the perspective of the user, the first layer or sub-component is based on the so called Ninja Web-Framework, which is required in order to handle the graphical interaction with the user by initiating a workflow instance. Below the Web Framework, the Business Process Management (BPM) platform Activiti initially receives the user commands and controls the processing of the corresponding instance. The Activity engine requests relevant information from the data source (IDGARD) and hands them over to the user. IDGARD, as the third or bottom layer of the architecture, is not just an external database but a sealed cloud solution. Therefore, it does not only store the data but provides API functions that ensure secure retrieval. Worklist/ User Interaction Submission Handling (Flow Control) Resource Access (Data Interaction) Figure 2: Architecture (own representation) Reasons for Usage of a 3-Layer-Architecure and its Components Since the goal is to develop and execute (cooking) workflows it is required to use Business Process Management and a solution to save the corresponding multimedia data. As a result, it is pre-determined to stage a 2-Layer-Architecure at minimum. Since it is a typical demand that users have not just local access to the workflows, a browserbased solution is reasonable. This kind of functionality is not offered by the already mentioned layers and therefore asks for an additional one.
5 245 Starting from the bottom layer, there is the complex question of how to save an application s data or where to put it. As Cloud Computing nowadays has already overcome just being a trend, it is appropriate and scientifically valuable to embed this idea into various contexts. IDGARD s sealed cloud is specifically designed to enhance security. Because protecting own content like graphically supported cooking steps or even whole recipes can be important, such a cloud service might be beneficial. This especially applies to companies that want to distribute such services via Internet and protect themselves against copyright infringements. Concerning the choice of a workflow engine, there is a huge range of open source technologies available. In terms of basic functionality (e.g. integration in an IDE or graphically establishing workflows) they usually show similarities. To address our requirements properly we decided to use two different GUI s for our project. Activiti as the modelling GUI and the Ninja Web-Framework for the user worklist. However, Activiti convinces with a distinct manual, a large community and a clear, browser based testing environment. To provide the worklist, the Ninja Web-Framework is useful because, as an integrated software stack, it already comprises many important libraries. By using a MongoDB database, we save standardized keywords for each possible instruction and ingredient on the one hand, as well as the recipes with already assigned processing times, instructions and information on the other hand. We are planning to use time information for the retrieval of a process in our future work. 4 Implementation Concept An abstract class in Java defines the fundamental set of functions, i.e. basic java members and abstract methods that deal with communicating information between java and JSON, and the log file for further checks and troubleshooting. Each function has still its own unique representation for requests and responses including the corresponding JSON formats. In order to successfully connect request- and response functionality for data interchange, some middleware classes are required. For providing cloud access, we have to send login-data and a random token of the client for identification purposes. The factory pattern is used to invoke requests and their corresponding response classes. The Java classes that realize the communication with the cloud server are directly implemented in the workflows, which we use for cooking instructions. Workflow engines for Business Process Management are abounding. Examples for these are JBoss, jbpm or Activiti. For our workflow development, we use Activiti as an open source workflow engine. Activiti uses BPMN 2.0 as a modelling language and can be easily integrated with Java environments (Alfresco 2015). We used seven already created pasta cooking workflows from the work of Minor et al. and converted them into an Activiti workflow (see Figure 3 following Minor, Bergmann et al. 2010). Each cooking task is modelled by a service task. This kind of task enables us to invoke
6 246 a Java class for API cloud access. We also deposit the ingredients as data objects directly in the activity workflow. Other content like pictures or movies for cooking instructions are stored in the cloud. In the example we have four individual instructions for the user. First, cook and place in serving bowl as well as puree should be conducted in parallel. Parallelization can be modelled using XOR-, AND- (symbolized by the plus), or LOOP-blocks (Schumacher, Minor et al. 2013). When both branches are finished the last task is toss. In each task, users get instructions with support of multimedia data from the cloud. To execute our designed workflows we use the Ninja Web framework. The Web framework (worklist) is a resource which performs the work presented by a workflow activity instance and Figure 4: Current worklist (own representation) therefore directly interacts with the user and supports her in executing her tasks (Workflow Management Coalition 1998). After successfully logging in, a user can choose to design her own recipe and upload new elements or choose ingredients to process. When searching for new processes for recipes in the database it is difficult to find a workflow or recipe which is well suited for the desired ingredients. To implement a search, case-based retrieval can be used. However, because of the small size of the recipe base in our solution this is not implemented yet. Each recipe consists of several steps that are described by its linked ingredients, related instructions and actions that are supposed to be undertaken. In Figure 4, the prototypical implementation of our worklist is depicted. The sample picture is directly imported from the cloud. The non-multimedia information around the task is saved in a MongoDB database. When the user starts to cook she immediately sees which ingredients she needs, processing time, next steps and a video or picture to support her task. In the left top corner of Figure 4, one can see the ingredients to be used for the particular task. In the center is a management board with the instructions supported by a video or
7 247 a picture of the specific task. The workflow running in the background is modelled in BPMN 2.0. By pressing next step the user is guided to the next task of the related recipe as specified in the BPMN workflow. Thereby, we provide a worklist with different instructions for a kitchen chef. 5 Discussion and Conclusion In our paper we present a novel approach to integrate a high security cloud storage (sealed cloud) in Business Process Management. We implement a new model for using a sealed cloud multimedia data storage for our workflow contents. The implementation of a case-based retrieval is not implemented yet. As a first step, we demonstrate a pastacooking workflow, which can be processed or uploaded by the user in a web form. The content is stored in the sealed cloud IDGARD of the Uniscon GmbH who provides the cloud infrastructure. The content and meta data is encrypted and protected from unauthorized provider or third-party access. By using cloud storage for our workflows we examine two main benefits: data protection and scalability. With the IDGARD solution third parties are not able to copy or even access the data. Scalable storage provides the advantage of adapting storage up and down on-demand without using rare data space on physical disks of computers or other devices (Armbrust, Fox et al. 2009). By using IDGARD, we are able to scale our storage capacity in a flexible way in response to service usage and new customer demands. Since it is very difficult to estimate, what recipes and data with instructions will be added, scalability is very important. Apart from that, the evolution in terms of video quality has significantly risen in the past years (and probably keeps rising in the future) which contributes to the fact that scalability is an important factor because customers also tend to pressure companies to provide state-of-the-art content. The amount of data that goes along with this development is significant. It is also possible to migrate our workflow engine into a cloud solution in future. As a result, the whole platform can be scaled in response to service usage. To sum up, our approach of using cloud storage for workflows in the cooking domain benefits from flexible scalability, higher privacy and data protection leading to a higher user experience especially for special interest groups of the cooking domain. The user no longer needs to use her limited, physical storage. She can store multimedia data with cooking instructions directly in the cloud. Our work also contributes to other future trends besides the cooking domain. Sealed cloud technology offers opportunities to use cloud storage without harming privacy or security regulations. This can be very important for audit companies who want to store audit-documents or other critical contents in the cloud.
8 248 7 Acknowledgment We would like to acknowledge our partnership with the Uniscon GmbH who provided us with their sealed cloud service IDGARD. 8 References Aalst, W. M., B. Benatallah and F. Casati (2003). Business Process Management, Springer-Verlag Berlin Heidelberg. Alfresco. (2015). "Activiti mission statement." Retrieved , 2015, from Armbrust, M., A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica and M. Zaharia (2009). Above the Clouds: A Berkeley View of Cloud Computing, Technical Report, UC Berkeley Reliable Adaptive Distributed Systems Laboratory. Ciovică, L., M. P. Cristescu and L. A. Fraţilă (2014). "Cloud Based Business Processes Orchestration." Procedia Economics and Finance 16(0): Workflow Management Coalition (1998) "Terminology & Glossary." Retrieved , 2015, from Hammer, M. and J. Champy (1994). Business Reengineering: Die Radikalkur für das Unternehmen. Campus-Verlag Frankfurt. Minor, M., R. Bergmann, S. Görg and K. Walter (2010). Adaptation of cooking instructions following the workflow paradigm, In: ICCBR 2010 Workshop Proceedings, pp MyCoachNutrition. (2015). "MyCoachNutrition." Retrieved , 2015, from Rieken, R. (2015). Datensicherheit als Herausforderung im Cloud-Computing-Trend. In: Marktplätze im Umbruch: pp , Springer. Santos, N., K. P. Gummadi and R. Rodrigues (2009). Towards trusted cloud computing. In: Proceedings of the 2009 conference on Hot topics in cloud computing. San Diego, California, USENIX Association. Schulte, S., C. Janiesch, S. Venugopal, I. Weber and P. Hoenisch (2015). "Elastic Business Process Management: State of the art and open challenges for BPM in the cloud." Future Generation Computer Systems 46(0): Schumacher, P., M. Minor and E. Schulte-Zurhausen (2013). Extracting and enriching workflows from text. In: Proceedings of the 2013 IEEE 14 th International Conference on Information Reuse and Integration (IRI), pp Wang, J., P. Korambath, I. Altintas, J. Davis and D. Crawl (2014). "Workflow as a Service in the Cloud: Architecture and Scheduling Algorithms." Procedia Computer Science 29(0):
Enriching Cooking Workflows with Multimedia Data from a High Security Cloud Storage
Enriching Cooking Workflows with Multimedia Data from a High Security Cloud Storage Patrick Bedué bedue@stud.uni-frankfurt.de Wenxia Han s0611400@stud.uni-frankfurt.de Mathias Hauschild s8722400@stud.uni-frankfurt.de
More informationA Proposed Case for the Cloud Software Engineering in Security
A Proposed Case for the Cloud Software Engineering in Security Victor Chang and Muthu Ramachandran School of Computing, Creative Technologies and Engineering, Leeds Metropolitan University, Headinley,
More informationTHE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT
TREX WORKSHOP 2013 THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT Jukka Tupamäki, Relevantum Oy Software Specialist, MSc in Software Engineering (TUT) tupamaki@gmail.com / @tukkajukka 30.10.2013 1 e arrival
More informationData Integrity for Secure Dynamic Cloud Storage System Using TPA
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure
More informationEFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
More informationHow To Understand Cloud Computing
International Journal of Advanced Computer and Mathematical Sciences ISSN 2230-9624. Vol4, Issue3, 2013, pp234-238 http://bipublication.com CURRENT SCENARIO IN ARCHITECT AND APPLICATIONS OF CLOUD Doddini
More informationGeoprocessing in Hybrid Clouds
Geoprocessing in Hybrid Clouds Theodor Foerster, Bastian Baranski, Bastian Schäffer & Kristof Lange Institute for Geoinformatics, University of Münster, Germany {theodor.foerster; bastian.baranski;schaeffer;
More informationSECURITY THREATS TO CLOUD COMPUTING
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 101-106 Impact Journals SECURITY THREATS TO CLOUD
More informationData Integrity Check using Hash Functions in Cloud environment
Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology
More informationAN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD Koncha Anantha Laxmi Prasad 1, M.Yaseen Pasha 2, V.Hari Prasad 3 1
More informationThe Workflow Management Coalition Specification Workflow Management Coalition Terminology & Glossary
The Workflow Management Coalition Specification Workflow Management Coalition Terminology & Glossary Workflow The automation of a business process, in whole or part, during which documents, information
More informationA Review of Load Balancing Algorithms for Cloud Computing
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -9 September, 2014 Page No. 8297-8302 A Review of Load Balancing Algorithms for Cloud Computing Dr.G.N.K.Sureshbabu
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK IMPLEMENTATION OF AN APPROACH TO ENHANCE QOS AND QOE BY MIGRATING SERVICES IN CLOUD
More informationPRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS
PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS Amar More 1 and Sarang Joshi 2 1 Department of Computer Engineering, Pune Institute of Computer Technology, Maharashtra,
More informationWinery A Modeling Tool for TOSCA-based Cloud Applications
Institute of Architecture of Application Systems Winery A Modeling Tool for TOSCA-based Cloud Applications Oliver Kopp 1,2, Tobias Binz 2, Uwe Breitenbücher 2, and Frank Leymann 2 1 IPVS, 2 IAAS, University
More informationSecured Storage of Outsourced Data in Cloud Computing
Secured Storage of Outsourced Data in Cloud Computing Chiranjeevi Kasukurthy 1, Ch. Ramesh Kumar 2 1 M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur Affiliated
More informationIndex Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune ghatkar.abhaya@gmail.com, jadhavreena70@yahoo.com, renjug03@gmail.com,
More informationCopyright IEEE. Citation for the published paper:
Copyright IEEE. Citation for the published paper: This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of BTH's products
More informationSECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
More informationInternational Journal of Advancements in Research & Technology, Volume 3, Issue 8, August-2014 68 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 3, Issue 8, August-2014 68 A Survey of Load Balancing Algorithms using VM B.KalaiSelvi 1 and Dr.L.Mary Immaculate Sheela 2 1 Research
More informationCMotion: A Framework for Migration of Applications into and between Clouds
Institute of Architecture of Application Systems CMotion: A Framework for Migration of Applications into and between Clouds Tobias Binz, Frank Leymann, David Schumm Institute of Architecture of Application
More informationSecurity Challenges in Hybrid Cloud Infrastructures
Security Challenges in Hybrid Cloud Infrastructures Koushik Annapureddy Aalto University - School of Science and Technology koushik.annapureddy@tkk.fi Abstract Cloud computing has the potential to significantly
More informationINVESTIGATION OF RENDERING AND STREAMING VIDEO CONTENT OVER CLOUD USING VIDEO EMULATOR FOR ENHANCED USER EXPERIENCE
INVESTIGATION OF RENDERING AND STREAMING VIDEO CONTENT OVER CLOUD USING VIDEO EMULATOR FOR ENHANCED USER EXPERIENCE Ankur Saraf * Computer Science Engineering, MIST College, Indore, MP, India ankursaraf007@gmail.com
More informationWeb 2.0-based SaaS for Community Resource Sharing
Web 2.0-based SaaS for Community Resource Sharing Corresponding Author Department of Computer Science and Information Engineering, National Formosa University, hsuic@nfu.edu.tw doi : 10.4156/jdcta.vol5.issue5.14
More informationDevelopment of enhanced Third party Auditing Scheme for Secure Cloud Storage
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,
More informationIMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya
More informationSecrecy Maintaining Public Inspecting For Secure Cloud Storage
Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan
More informationModel-Driven Engineering meets the Platform-as-a-Service Model
Model-Driven Engineering meets the Platform-as-a-Service Model Adrián Juan-Verdejo Information Systems Chair Stuttgart University, Germany adrianppg@gmail.com Abstract. Organisations who want to migrate
More informationAdvanced Task Scheduling for Cloud Service Provider Using Genetic Algorithm
IOSR Journal of Engineering (IOSRJEN) ISSN: 2250-3021 Volume 2, Issue 7(July 2012), PP 141-147 Advanced Task Scheduling for Cloud Service Provider Using Genetic Algorithm 1 Sourav Banerjee, 2 Mainak Adhikari,
More informationOptimized and Secured Educlouds by Implementing Virtualization
International Journal of Electronics and Computer Science Engineering 2404 Available Online at www.ijecse.org ISSN- 2277-1956 Optimized and Secured Educlouds by Implementing Virtualization R. Rajesh 1,
More informationA Web Base Information System Using Cloud Computing
A Web Base Information System Using Cloud Computing Zainab Murtadha, Mohammad Amin Roshanasan Abstract: Cloud Computing is the new field that was invented and developed during a period not so long ago.
More informationPrivacy-Aware Scheduling for Inter-Organizational Processes
Privacy-Aware Scheduling for Inter-Organizational Processes Christoph Hochreiner Distributed Systems Group, Vienna University of Technology, Austria c.hochreiner@infosys.tuwien.ac.at Abstract Due to the
More informationAn Efficient Checkpointing Scheme Using Price History of Spot Instances in Cloud Computing Environment
An Efficient Checkpointing Scheme Using Price History of Spot Instances in Cloud Computing Environment Daeyong Jung 1, SungHo Chin 1, KwangSik Chung 2, HeonChang Yu 1, JoonMin Gil 3 * 1 Dept. of Computer
More informationContext Aware Mobile Network Marketing Services
Context-aware Mobile Multimedia Services in the Cloud Dejan Kovachev, Ralf Klamma Chair for Computer Science 5 (Information Systems), RWTH Aachen University Ahornstr. 55, D-52056, Aachen, Germany {kovachev,
More informationPLATFORM-AS-A-SERVICE (PAAS): THE ADOXX METAMODELLING PLATFORM
PLATFORM-AS-A-SERVICE (PAAS): THE ADOXX METAMODELLING PLATFORM Dimitris Karagiannis and Niksa Visic University of Vienna, Knowledge Engineering Research Group, Brünnerstr. 72, A-1210 Vienna, Austria {dk,
More informationCLOUD BASED HOME SECURITY 1 Anjali Chachra 1
CLOUD BASED HOME SECURITY 1 Anjali Chachra 1 Computer Science, KJ Somaiya college of engineering Email: 1 chachraanjali@yahoo.co.in Abstract This report deals with the design and implementation of a Home
More informationAn Architecture Model of Sensor Information System Based on Cloud Computing
An Architecture Model of Sensor Information System Based on Cloud Computing Pengfei You, Yuxing Peng National Key Laboratory for Parallel and Distributed Processing, School of Computer Science, National
More informationMODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT Soumya V L 1 and Anirban Basu 2 1 Dept of CSE, East Point College of Engineering & Technology, Bangalore, Karnataka, India
More informationUnderstanding the Cloud: Towards a Suitable Cloud Service
International Journal of Scientific and Research Publications, Volume 4, Issue 1, January 2014 1 Understanding the Cloud: Towards a Suitable Cloud Service Huda S. Alrowaihi Computer Information Systems,
More informationAn Overview on Important Aspects of Cloud Computing
An Overview on Important Aspects of Cloud Computing 1 Masthan Patnaik, 2 Ruksana Begum 1 Asst. Professor, 2 Final M Tech Student 1,2 Dept of Computer Science and Engineering 1,2 Laxminarayan Institute
More informationSan Diego Supercomputer Center, UCSD. Institute for Digital Research and Education, UCLA
Facilitate Parallel Computation Using Kepler Workflow System on Virtual Resources Jianwu Wang 1, Prakashan Korambath 2, Ilkay Altintas 1 1 San Diego Supercomputer Center, UCSD 2 Institute for Digital Research
More informationDynamic Resource Pricing on Federated Clouds
Dynamic Resource Pricing on Federated Clouds Marian Mihailescu and Yong Meng Teo Department of Computer Science National University of Singapore Computing 1, 13 Computing Drive, Singapore 117417 Email:
More informationKeywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party
More informationResearch on Operation Management under the Environment of Cloud Computing Data Center
, pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering
More informationEarly Cloud Experiences with the Kepler Scientific Workflow System
Available online at www.sciencedirect.com Procedia Computer Science 9 (2012 ) 1630 1634 International Conference on Computational Science, ICCS 2012 Early Cloud Experiences with the Kepler Scientific Workflow
More informationEnhancing Dataset Processing in Hadoop YARN Performance for Big Data Applications
Enhancing Dataset Processing in Hadoop YARN Performance for Big Data Applications Ahmed Abdulhakim Al-Absi, Dae-Ki Kang and Myong-Jong Kim Abstract In Hadoop MapReduce distributed file system, as the input
More informationDC2AP Metadata Editor: A Metadata Editor for an Analysis Pattern Reuse Infrastructure
DC2AP Metadata Editor: A Metadata Editor for an Analysis Pattern Reuse Infrastructure Douglas Alves Peixoto, Lucas Francisco da Matta Vegi, Jugurta Lisboa-Filho Departamento de Informática, Universidade
More informationSemantic Business Process Management Lectuer 1 - Introduction
Arbeitsgruppe Semantic Business Process Management Lectuer 1 - Introduction Prof. Dr. Adrian Paschke Corporate Semantic Web (AG-CSW) Institute for Computer Science, Freie Universitaet Berlin paschke@inf.fu-berlin.de
More informationAN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT Mohd Abdul Shoaib 1, Akheel Mohammed 2, Ayesha 3
More informationCloud application for water resources modeling. Faculty of Computer Science, University Goce Delcev Shtip, Republic of Macedonia
Cloud application for water resources modeling Assist. Prof. Dr. Blagoj Delipetrev 1, Assist. Prof. Dr. Marjan Delipetrev 2 1 Faculty of Computer Science, University Goce Delcev Shtip, Republic of Macedonia
More informationPRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING T.Vidhya Sree M.Phil Research Scholar,CS, MGR College, Hosur (India) ABSTRACT Cloud Computing is the long dreamed vision
More informationPrivacy Preservation and Secure Data Sharing in Cloud Storage
OPEN ACCESS Int. Res. J. of Science & Engineering, 2015; Vol. 3 (6): 231-236 ISSN: 2322-0015 RESEARCH ARTICLE Privacy Preservation and Secure Data Sharing in Cloud Storage Chavhan Bhaurao* and Deshmukh
More informationMEDIA CLOUD: WHEN MEDIA REVOLUTION MEETS RISE OF CLOUD COMPUTING
MEDIA CLOUD: WHEN MEDIA REVOLUTION MEETS RISE OF CLOUD COMPUTING Prof. Ajaykumar T. Shah Alpha College of Engineering and Technology, Gandhinagar, Gujarat Abstract: Media content has become the major traffic
More informationCollaborative Knowledge Flow Improving Process-Awareness and Traceability of Work Activities
Collaborative Knowledge Flow Improving Process-Awareness and Traceability of Work Activities Schahram Dustdar Information Systems Institute, Distributed Systems Group, Vienna University of Technology,
More informationConceptual Approach for Performance Isolation in Multi-Tenant Systems
Conceptual Approach for Performance Isolation in Multi-Tenant Systems Manuel Loesch 1 and Rouven Krebs 2 1 FZI Research Center for Information Technology, Karlsruhe, Germany 2 SAP AG, Global Research and
More informationAdaptive Workflow Management in the Cloud Towards a Novel Platform as a Service
Adaptive Workflow Management in the Cloud Towards a Novel Platform as a Service Mirjam Minor, Ralph Bergmann, Sebastian Görg Business Information Systems II University of Trier 54286 Trier, Germany {minor
More informationMobile Cloud Middleware: A New Service for Mobile Users
Mobile Cloud Middleware: A New Service for Mobile Users K. Akherfi, H. Harroud Abstract Cloud computing (CC) and mobile cloud computing (MCC) have advanced rapidly the last few years. Today, MCC undergoes
More informationA Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments
A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments Faraz Fatemi Moghaddam (f.fatemi@ieee.org) Omidreza Karimi (omid@medicatak.com.my) Dr. Ma en T. Alrashdan (dr.maen@apu.edu.my)
More informationBPM in Cloud Architectures: Business Process Management with SLAs and Events
BPM in Cloud Architectures: Business Process Management with SLAs and Events Vinod Muthusamy and Hans-Arno Jacobsen University of Toronto 1 Introduction Applications are becoming increasingly distributed
More informationWebRTC: Why and How? FRAFOS GmbH. FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com
WebRTC: Why and How? FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com This docume nt is copyright of FRAFOS GmbH. Duplication or propagation or e xtracts
More informationTask Placement in a Cloud with Case-based Reasoning
Task Placement in a Cloud with Case-based Reasoning Eric Schulte-Zurhausen and Mirjam Minor Institute of Informatik, Goethe University, Robert-Mayer-Str.10, Frankfurt am Main, Germany {eschulte, minor}@informatik.uni-frankfurt.de
More informationCiteSeer x in the Cloud
Published in the 2nd USENIX Workshop on Hot Topics in Cloud Computing 2010 CiteSeer x in the Cloud Pradeep B. Teregowda Pennsylvania State University C. Lee Giles Pennsylvania State University Bhuvan Urgaonkar
More informationHeterogeneity-Aware Resource Allocation and Scheduling in the Cloud
Heterogeneity-Aware Resource Allocation and Scheduling in the Cloud Gunho Lee, Byung-Gon Chun, Randy H. Katz University of California, Berkeley, Yahoo! Research Abstract Data analytics are key applications
More informationA METHOD FOR REWRITING LEGACY SYSTEMS USING BUSINESS PROCESS MANAGEMENT TECHNOLOGY
A METHOD FOR REWRITING LEGACY SYSTEMS USING BUSINESS PROCESS MANAGEMENT TECHNOLOGY Gleison Samuel do Nascimento, Cirano Iochpe Institute of Informatics, Federal University of Rio Grande do Sul, Porto Alegre,
More informationSheltered Multi-Owner Data distribution For vibrant Groups in the Cloud
Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud I.sriram murthy 1 N.Jagajeevan 2 II M-Tech student Assistant.Professor Department of computer science & Engineering Department of
More informationAn Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.730
More informationOn the Amplitude of the Elasticity Offered by Public Cloud Computing Providers
On the Amplitude of the Elasticity Offered by Public Cloud Computing Providers Rostand Costa a,b, Francisco Brasileiro a a Federal University of Campina Grande Systems and Computing Department, Distributed
More informationA Study on the Cloud Computing Architecture, Service Models, Applications and Challenging Issues
A Study on the Cloud Computing Architecture, Service Models, Applications and Challenging Issues Rajbir Singh 1, Vivek Sharma 2 1, 2 Assistant Professor, Rayat Institute of Engineering and Information
More informationData-Aware Service Choreographies through Transparent Data Exchange
Institute of Architecture of Application Systems Data-Aware Service Choreographies through Transparent Data Exchange Michael Hahn, Dimka Karastoyanova, and Frank Leymann Institute of Architecture of Application
More informationPerformance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing
Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Gunnala Ajay Kumar M.Tech Student Department of CSE Global Group Of Institutions Batasingaram, Ranga Reddy (Dist),
More informationKeywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
More informationThe Need for Service Catalog Design in Cloud Services Development
The Need for Service Catalog Design in Cloud Services Development The purpose of this document: Provide an overview of the cloud service catalog and show how the service catalog design is an fundamental
More informationThe Impact of Cloud Computing on Saudi Organizations: The Case of a Telecom Company
International Journal of Computing Academic Research (IJCAR) ISSN 2305-9184 Volume 3, Number 6(December 2014), pp. 126-130 MEACSE Publications http://www.meacse.org/ijcar The Impact of Cloud Computing
More informationA Cloud Architecture for an Extensible Multi-Paradigm Modeling Environment
A Cloud Architecture for an Extensible Multi-Paradigm Modeling Environment Jonathan Corley 1 and Eugene Syriani 2 1 University of Alabama, U.S.A. 2 Université de Montréal, Canada Abstract. We present the
More informationPortable Cloud Services Using TOSCA
Institute of Architecture of Application Systems Portable Cloud Services Using TOSCA Tobias Binz, Gerd Breiter, Frank Leymann, and Thomas Spatzier Institute of Architecture of Application Systems, University
More informationCloud Computing and Digital Preservation: A Comparison of Two Services. Amanda L. Stowell. San Jose State University
Cloud Computing and Digital Preservation: A Comparison of Two Services Amanda L. Stowell San Jose State University Abstract This paper will discuss the obstacles and methods of digital object preservation,
More informationSupply Chain Platform as a Service: a Cloud Perspective on Business Collaboration
Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration Guopeng Zhao 1, 2 and Zhiqi Shen 1 1 Nanyang Technological University, Singapore 639798 2 HP Labs Singapore, Singapore
More informationOrbiter Series Service Oriented Architecture Applications
Workshop on Science Agency Uses of Clouds and Grids Orbiter Series Service Oriented Architecture Applications Orbiter Project Overview Mark L. Green mlgreen@txcorp.com Tech-X Corporation, Buffalo Office
More informationAn Agent-Based Concept for Problem Management Systems to Enhance Reliability
An Agent-Based Concept for Problem Management Systems to Enhance Reliability H. Wang, N. Jazdi, P. Goehner A defective component in an industrial automation system affects only a limited number of sub
More informationOptimize workloads to achieve success with cloud and big data
IBM Software Thought Leadership White Paper December 2012 Optimize workloads to achieve success with cloud and big data Intelligent, integrated, cloud-enabled workload automation can improve agility and
More informationAbove the clouds: A Berkeley View of Cloud Computing
Partial Review-2 On the paper Above the clouds: A Berkeley View of Cloud Computing By Nikhil Ramteke Sr. No.- 07125 6. Cloud Computing Economics Observation in Cloud Economics mainly concerns with following
More informationHow To Set Up Wiremock In Anhtml.Com On A Testnet On A Linux Server On A Microsoft Powerbook 2.5 (Powerbook) On A Powerbook 1.5 On A Macbook 2 (Powerbooks)
The Journey of Testing with Stubs and Proxies in AWS Lucy Chang lucy_chang@intuit.com Abstract Intuit, a leader in small business and accountants software, is a strong AWS(Amazon Web Services) partner
More informationAn Analysis of Data Security Threats and Solutions in Cloud Computing Environment
An Analysis of Data Security Threats and Solutions in Cloud Computing Environment Rajbir Singh 1, Vivek Sharma 2 1, 2 Assistant Professor, Rayat Institute of Engineering and Information Technology Ropar,
More informationHow To Understand The Individual Competences Of An It Manager
ORGANIZATIONS ARE GOING TO THE CLOUD: WHICH COMPETENCES FOR THE IT MANAGER? Luca Sabini, Stefano Za, Paolo Spagnoletti LUISS Guido Carli University Rome Italy {lsabini, sza, pspagnoletti}@luiss.it ABSTRACT
More informationSEALED CLOUD. A Reliable Data Center Excluding Provider Access to Client Data WHITE PAPER. Uniscon GmbH - The Web Privacy Company
SEALED CLOUD A Reliable Data Center Excluding Provider Access to Client Data WHITE PAPER Uniscon GmbH - The Web Privacy Company Agnes-Pockels-Bogen 1 80992 Munich 1 Table of Contents 1. Cloud Computing
More informationInvestigation of Cloud Computing: Applications and Challenges
Investigation of Cloud Computing: Applications and Challenges Amid Khatibi Bardsiri Anis Vosoogh Fatemeh Ahoojoosh Research Branch, Islamic Azad University, Sirjan, Iran Research Branch, Islamic Azad University,
More informationProcesses for the Future: Sustainable External Dependencies of Processes
Processes for the Future: Sustainable External Dependencies of Processes Stephan Strodl SBA Research Vienna, Austria sstrodl@sba-research.org ABSTRACT Processes form an integral part of today s business
More informationDigital Watermark Mobile Agents *
Digital Watermark Mobile Agents * Jian Zhao and Chenghui Luo Fraunhofer Center for Research in Computer Graphics, Inc. 321 South Main Street Providence, RI 02903 Abstract Digital watermarking has emerged
More informationMinimal Cost Data Sets Storage in the Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.1091
More informationHEALTH INFORMATION MANAGEMENT ON SEMANTIC WEB :(SEMANTIC HIM)
HEALTH INFORMATION MANAGEMENT ON SEMANTIC WEB :(SEMANTIC HIM) Nasim Khozoie Department of Computer Engineering,yasuj branch, Islamic Azad University, yasuj, Iran n_khozooyi2003@yahoo.com ABSTRACT Information
More informationDATABASE DYNAMIC MANAGEMENT PLATFORM (DBDMS) IN OPERATIVE SOFTWARE SYSTEMS
DATABASE DYNAMIC MANAGEMENT PLATFORM (DBDMS) IN OPERATIVE SOFTWARE SYSTEMS 1. INTRODUCTION Virgil Chichernea 1 Dragos-Paul Pop 2 In a globalized society with state of the art informational technologies,
More informationTHE IMPACT OF CLOUD COMPUTING ON ENTERPRISE ARCHITECTURE. Johan Versendaal
THE IMPACT OF CLOUD COMPUTING ON ENTERPRISE ARCHITECTURE Johan Versendaal HU University of Applied Sciences Utrecht Nijenoord 1, 3552 AS Utrecht, Netherlands, johan.versendaal@hu.nl Utrecht University
More informationReputation in Cloud Computing
Reputation in Cloud Computing Adrian Yanes Aalto University School of Science and Technology adrian.yanes@aalto.fi Abstract Nowadays the concept of cloud computing is getting popular around the Net. The
More informationEnsuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
More information[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AVOID DATA MINING BASED ATTACKS IN RAIN-CLOUD D.Sudhagar * * Assistant Professor, Department of Information Technology, Jerusalem
More informationDynamic Resource management with VM layer and Resource prediction algorithms in Cloud Architecture
Dynamic Resource management with VM layer and Resource prediction algorithms in Cloud Architecture 1 Shaik Fayaz, 2 Dr.V.N.Srinivasu, 3 Tata Venkateswarlu #1 M.Tech (CSE) from P.N.C & Vijai Institute of
More informationResearch on P2P-SIP based VoIP system enhanced by UPnP technology
December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system
More informationNew Cloud Computing Network Architecture Directed At Multimedia
2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.16 New Cloud Computing Network
More informationSecure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
More informationInternational Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0047 ISSN (Online): 2279-0055 International
More information